Help Net Security
New two-factor authentication tokens ready for 64-bit Windows environments
Secure Computing announced the immediate availability of SafeWord 2008, their new two-factor authentication solution. These easy-to-use tokens provide highly secure and cost …
IBM leads the pack in the intrusion detection market
IBM announced that it has been recognized as the world leader in the intrusion detection and intrusion prevention market in 2007 in a new research service by global growth …
Check out the “Hiring Guide To The Information Security Profession”
(ISC)² published “Hiring Guide to the Information Security Profession”, a free reference guide for human resource (HR) professionals, hiring managers and …
Smallest form-factor data security card
Hifn announced immediate availability of the Express DS 255, the industry’s highest-performance, lowest-power and smallest form-factor data security card. Delivering …
First device Certificate Authority for next-gen crypto
Certicom launched its new Certicom Device Certificate Authority, a managed service offering that issues digital certificates to high-volume device manufacturers that have bulk …
Net/FSE: free network forensic search engine
Network security tools company Packet Analytics launched Net/FSE, the Network Forensic Search Engine. Net/FSE is the first commercial search engine for enterprise network data …
Where is malware hosted?
The results of Sophos research into which countries contain the most malware-hosting websites reveal some significant changes over last year’s top ten list. China has …
IBM Lotus Quickr file encryption solution
New Voltage SecureFile for IBM Lotus Quickr brings information encryption to documents within the Lotus collaboration environment.Voltage SecureFile for IBM Lotus Quickr …
Listing of recent cybercrime related arrests
The repercussions for cybercriminals are finally coming in line with the severity of their crimes. With international computer crime authorities joining efforts in a bid to …
Storm worm chronology
The Storm worm, also known as Dref or Dorf, was 2007’s most disruptive threat, with around 50,000 variants seen over the course of 2007. The criminals behind the Storm …
2008 threat report: Mobile security threats
More info from the Sophos Threat Report for 2008. There are approximately 200 malware threats for mobile phones, compared to over 300,000 for Windows. The risk of being …
Mac security under real threat?
In its latest security threat report, Sophos reveals that in 2007 organised criminal gangs for the first time arrived at Apple’s doorstep with the intention of stealing …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts